AF_Debug_Breakpoint
init
Static task
static1
Behavioral task
behavioral1
Sample
a4650c109fdc0f5cb76a6f9fd989fa50_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4650c109fdc0f5cb76a6f9fd989fa50_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a4650c109fdc0f5cb76a6f9fd989fa50_JaffaCakes118
Size
120KB
MD5
a4650c109fdc0f5cb76a6f9fd989fa50
SHA1
b6b88916e3a022f71ecd12c9315becf0c1892283
SHA256
ba895fa8870f2583362c17d03fdda2c2da98228d7596595a9ca956ba1ac7cde5
SHA512
54df18216400084a662862d95f61ee38b05e7de04b6680a2a98c60e6cb62136522fb49918ebcb76be298add2d0481b64858ee110a2331eab14682a996a021718
SSDEEP
3072:F9azL+hd8yWsu7IRTsPiPz0zMHZ9s6X+mzyizWO:vazLId8hsmATs6EMm1
Checks for missing Authenticode signature.
resource |
---|
a4650c109fdc0f5cb76a6f9fd989fa50_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetUserNameA
CloseHandle
CreateEventA
CreateFileA
CreateThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemTime
GetTempPathA
GetTickCount
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
LoadLibraryA
OpenEventA
ReadFile
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
Sleep
SystemTimeToFileTime
WaitForSingleObject
WriteFile
GetLocalTime
GetEnvironmentVariableA
GetLocaleInfoA
GetTimeZoneInformation
GetVersion
GetWindowsDirectoryA
BackupRead
DeleteFileA
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetFileTime
GetLogicalDrives
SetFileTime
CreateMutexA
ReleaseMutex
CreatePipe
CreateProcessA
DuplicateHandle
GetExitCodeProcess
PeekNamedPipe
TerminateProcess
FormatMessageA
GetFileType
GetPrivateProfileSectionA
MoveFileA
WritePrivateProfileSectionA
HeapReAlloc
getsockname
shutdown
recv
listen
inet_ntoa
connect
closesocket
bind
accept
WSAGetLastError
WSAAsyncSelect
gethostname
send
inet_addr
ioctlsocket
WSACancelAsyncRequest
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
socket
WSAStartup
WSACleanup
PostMessageA
OemToCharBuffA
CharToOemBuffA
ExitWindowsEx
EnumWindows
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
ShowWindow
SetWindowsHookExA
SendMessageA
RegisterClassA
PostThreadMessageA
PostQuitMessage
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
IsClipboardFormatAvailable
GetWindowThreadProcessId
CallNextHookEx
CloseClipboard
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
FindWindowA
GetActiveWindow
GetClassLongA
GetClassNameA
GetClipboardData
GetMessageTime
GetParent
GetWindowTextA
ShellExecuteA
AF_Debug_Breakpoint
init
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ